The Research of Equipment’s Security in Electric Power Communication Access Network

Article Preview

Abstract:

In the "12th Five-Year Plan" period, government will continue to promote the construction of Intelligent Electric Grid , and the construction of more efficient electric power communication access network will also go into the extensive stage from partial stage. But as so far, a large number of public network devices are applied in power communication system, so the equipment’s security is one important issue. This paper analyze the situation of electric power communication access network firstly, and then introduce our specific work in some one device’s security, such as user authentication protocol, the hand-in-hand protection of EPON, and devices’ EMC.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1718-1721

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] State Grid Corporation of China, Telecommunication for Power system for power system twelfth Five Years plan Report of State Grid Corporation of China[R], 2010.

DOI: 10.17775/cseejpes.2017.00940

Google Scholar

[2] CAO Hui-bin. The Summary of"12th Five-Year" Telecommunication Network Plan of SGCC. Telecommunications for Electric Power System[J], 2011, 32(5).

Google Scholar

[3] ZHAO Zi-yan, ZHANG Da-wei. Analysis on the Requirement of SGCC on Telecommunication Services in the"12th Five-Year Plan"Period[J]. Telecommunications for Electric Power System[J], 2011, 32(5).

Google Scholar

[4] ZHANG Yu-feng, SUN Zhi-xin. Swap Based on Hot Standby and Its Application in High-end Router[J]. Computer Technology and Development, 2010, (03): 172-175+179.

Google Scholar

[5] LIU Yi-yong , REN Wen-zhu , FENG Jian-qiang, HU Xin-min. Research on Electromagnetic Compatibility Test Port Model of Smart High Voltage Equipment[A]. Proceedings of Asia-Pacific Conference on Environmental Electromagnetics[C], 2012: 3.

DOI: 10.1109/ceem.2012.6410648

Google Scholar

[6] CHEN Hong, SU Li, SHI Guo-wei, JIN De-peng, ZENG Lie-guang. Survivability of EPON access networks[J]. Journal of Tsinghua University (Science and Technology), 2004, (07): 933-937.

Google Scholar

[7] SUN Zhong-wei, MA Ya-ning, WANG Yi-rong, HUO Si-tian, XU Guang-nian. A Communication System for Distribution Automation Using EPON and Its Security Mechanism. Automation of Electric Power Systems, 2010, 34(8).

Google Scholar

[8] YANG Zheng, GUANG De-jun, BAI Di. Research on security framework of power system information. Journal of Shenyang Institute of Engineering, 2009, (03): 261-264.

Google Scholar

[9] Q/GDW 553. 1-2010, Based on Ethernet Passive Optical Network (EPON) system part 1: Technical conditions[S].

Google Scholar